An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography

D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …

Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks

P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …

An elliptic curve-based mutual authentication scheme for RFID implant systems

SR Moosavi, E Nigussie, S Virtanen, J Isoaho - Procedia Computer Science, 2014 - Elsevier
In this paper, a secure mutual authentication scheme for an RFID implant system is
developed. An insecure communication channel between a tag and a reader makes the …

[PDF][PDF] A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography.

Q Qian, YL Jia, R Zhang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Abstract Radio Frequency Identification (RFID) is a promising new technology that is widely
deployed for object tracking and monitoring, ticketing, supply-chain management …

RFID ownership transfer protocol based on cloud

T Cao, X Chen, R Doss, J Zhai, LJ Wise, Q Zhao - Computer Networks, 2016 - Elsevier
RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there
are few research works which combine RFID ownership transfer schemes with Cloud …

[PDF][PDF] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography.

Y Liu, X Qin, C Wang, B Li - J. Comput., 2013 - jcomputers.us
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency
Identification (RFID) system development further. In this paper, we propose a robust …

Framework and authentication protocols for smartphone, NFC, and RFID in retail transactions

P Urien, S Piramuthu - 2013 IEEE Eighth International …, 2013 - ieeexplore.ieee.org
As automation gains increasing popularity in supply chains and retail stores for processes
such as inventory management, there is an increasing interest in automating processes in …

Authentication protocol for securing internet of things

A Maarof, M Senhadji, Z Labbi… - Proceedings of the Fourth …, 2018 - dl.acm.org
The Internet of things (IoT) is become an important research topic because it integrates
various sensors and objects to communicate directly with one another object without human …

A hierarchical anti-counterfeit mechanism: securing the supply chain using RFIDs

Z Bilal, K Martin - Foundations and Practice of Security: 6th International …, 2014 - Springer
Counterfeiting is a very serious threat to supply chain management systems. RFID systems
are widely used to automate and speed up the process of remotely identifying products …

LLCPS and SISO: A TLS-based framework with RFID for NFC P2P retail transaction processing

P Urien, S Piramuthu - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
The introduction of smartphones enabled with Near Field Communication (NFC) technology
facilitates transformation of processes that involve manual intervention such as payment …